Advanced Search
Content Type: Examples
In early 2011, Facebook launched "Sponsored Stories", an advertising product that used content from members' posts inside ads displayed on the service. Drawing on Likes, check-ins, and comments, a Sponsored Story might use a member's photograph and their comments from a coffee shop to create an ad that would then be displayed alongside other ads. Users were provided no ability to opt out. Among the inaugural advertisers was Coca-Cola, and Starbucks featured in a marketing video Facebook made to…
Content Type: Examples
In October 2010, the Wall Street Journal discovered that apps on Facebook were sending identifying information such as the names of users and their Friends to myriad third-party app advertising and internet tracking companies. All of the ten most popular Facebook apps, including Zynga's FarmVille, Texas HoldEm Poker, and FrontierVille, were found to be transmitting personal information about their users' Friends to outside companies. While Facebook and defenders of online tracking argued that…
Content Type: Examples
When journalist Alex Hern needed to set up a Facebook account in order to manage the Guardian's technology page and other work-related things, he locked down its privacy settings so that the account's profile would not appear in searches and only Friends of Friends could add him as a friend. In October 2017, Hern discovered that these settings no longer applied: an update to Facebook's internal search engine gave users the ability to search the entire network. While private posts remained…
Content Type: Examples
In April 2010, Facebook launched a set of tools to enable websites to add a social layer by adding a Facebook frame to their pages. The company's three launch partners, Microsoft's Docs.com, Yelp, and Pandora, had access to a more comprehensive tool, Instant Personalization, which allowed them to look directly at individuals' Facebook profiles and use the public information presented there to provide a personalised experience such as playing music (Pandora) or restaurants (Yelp) that the person…
Content Type: Examples
In September 2007, Facebook, which from its 2004 founding had stressed the privacy of its user profiles and interactions, opened up its profiles to public search engines such as Google and Bing. Facebook's new "public listing search" allowed anyone to search for a particular person; such searches returned the name and profile picture of all members who had set their search privacy to "Everyone". The benefit to Facebook was to encourage non-users to sign up when they saw their friends and family…
Content Type: Examples
In July 2009 after an in-depth study of the site spurred by complaints from the Canadian Internet Policy and Public Interest Clinic at the University of Ottawa, Canada's Privacy Commissioner issued a ruling that Facebook was in direct violation of the country's privacy laws. Among the regulator's complaints: the company's privacy policies were often confusing, incomplete, and generally lacked transparency; the company did not make a reasonable effort to inform users how their private…
Content Type: Examples
In February 2008, users discovered that deleting their account from Facebook does not entirely remove it. Instead, the company's servers retained copies of the information in those accounts indefinitely even after those users telephoned the company to request full removal. The company argued that retaining the data benefits users by making it easy for them to resurrect their accounts later, should they choose to do so. Facebook's website did not make this clear; only users who contacted the…
Content Type: Examples
In November 2007, Facebook launched Beacon, an advertising programme that allowed third-party sites to include a script that passed Facebook notifications about users' activities on their sites such as purchases, auction bids, reviews, and game-playing. The service as originally designed offered no opportunity to opt out, and a public outcry ensued; many people did not want their activities broadcast automatically to all their Friends. Users also soon found that Beacon transmitted information…
Content Type: Examples
In May 2009, University of Cambridge computer science researcher Joseph Bonneau discovered as part of his research that many social network respond to user requests to delete photographs by hiding them while remaining them on their servers. Among the worst offenders were Facebook, MySpace, Bebo, and LiveJournal. A Facebook spokesman explained that while photographs were immediately deleted from the company's own servers, the data would take longer to be removed from Akamai, the Content Delivery…
Content Type: Examples
In 2006, Facebook redesigned its system to add News Feed and Mini-Feed features, which the company said were intended to give users information about their social world. The News Feed was designed to provide a constantly updated stream of stories including updates from each user's Friends and Facebook groups, along with news stories tailored to their interests. Mini-Feed collected each user's updates into a new section on their profile page. Almost immediately, public backlash forced company…
Content Type: Examples
Over the years from 2005, when Facebook was still known as "Thefacebook" and its membership was still limited to verifiable Harvard students, to 2010, Facebook changed its privacy policies many times. Over that time, the default circle of who could view users' data widened over time, first to include schools and local areas, then to the entire Facebook network, then to the wider internet, and finally to third-party apps and advertisers. Taken together, the story is one of a service that began…
Content Type: Examples
The first iteration of Facebook, which then-student Mark Zuckerberg launched at Harvard University in 2003, was known as "Facemash", and was based on a popular website of the day, Am I Hot or Not? Using photographs of students scraped from those collected by the university's houses of residence, the site showed users pairs of randomly selected photographs and asked them to choose the "hotter" person in order to compile student attractiveness rankings. Zuckerberg was forced to take the site down…
Content Type: Examples
A data breach at the Internet Research Agency, the Russian troll farm at the centre of Russia's interference in the 2016 US presidential election, reveals that one way the IRA operated was to use identities stolen from Americans. Using these accounts and other fake ones, the troll farm interacted via social media with genuine US activists and recruited them to participate in and help organise rallies, all in the interests of aggravating long-standing American social divisions.
https://…
Content Type: Examples
According to whistleblower Christopher Wylie, during the 2014 US midtern elections, Cambridge Analytica, needing data to complete the new products it had promised to political advisor Steve Bannon, harvested private information from the Facebook profiles of more than 50 million users without their permission. There was enough information about 30 million of these users to match them to other records and build psychographic profiles.
After the news became public in March 2018, Facebook…
Content Type: Examples
In March 2018, Facebook announced it was scrapping plans to show off new home products at its developer conference in May, in part because revelations about the use of internal advertising tools by Cambridge Analytica have angered the public. The new products were expected to include connected speakers with digital assistant and video chat; they are now undergoing a review to ensure that they incorporate the right approach to user data. At the developer conference the company will also explain…
Content Type: Examples
Users downloading their Facebook histories have been startled to find that the company has been collecting call and SMS data. The company has responded by saying users are in control of what's uploaded to Facebook. However, the company also says it's a widely used practice when users first sign in on their phones to a messaging or social media app to begin by uploading the phone's contact list. That data then becomes part of the company's friend recommendation algorithm. On versions of Android…
Content Type: Examples
The Houston, Texas-based online dating startup Pheramor claims to use 11 "attraction genes" taken from DNA samples in its matchmaking algorithm. Launched in February 2018 in Houston with 3,000 users, Pheramor also encourages users to connect it to their social media profiles so it can datamine them for personality traits and common interests. Members pay $19.99 plus a $10 monthly fee and send in a cheek swab using a kit Pheramor supplies. In response, the company combines the genetic and social…
Content Type: Examples
Behind the colourful bicycles and games rooms, Silicon Valley tech giants operate a strict code of secrecy, relying on a combination of cultural pressure, digital and physical surveillance, legal threats, and restricted stock to prevent and detect not only criminal activity and intellectual property theft but also employees and contracts who speak publicly about their working conditions. Apple has long been known for requiring employees to sign project-specific non-disclosure agreements (NDAs…
Content Type: Examples
The small, portable GrayKey box, costing $15,000 for an internet-connected version tied to a specific location or $30,000 for an offline version usable anywhere, takes two minutes to install proprietary software designed to guess an iPhone's passcode. Intended for use by law enforcement officials, the box can take from a few hours to crack a short passcode to several days for a longer one. Once cracked, the passcode is displayed on the iPhone's screen; then the iPhone can be reconnected to the…
Content Type: Examples
As part of its attempt to keep its 40,000 drivers operating on the streets of London after Transport for London ruled in October 2017 it was not "fit and proper" to run a taxi service, Uber has promised to share its anonymised data on travel conditions and journey times. TfL said in February 2018 that sharing travel pattern data could help it improve understanding of operators' services.
https://uk.reuters.com/article/us-uber-britain/uber-to-share-its-london-data-in-latest-charm-…
Content Type: Examples
The accuracy of Facebook's ad targeting sometimes leads users to believe that Facebook is spying on them by tapping the microphones in their phones. Facebook has denied the practice - and is likely telling the truth because uploading and scanning the amount of audio data such a system would involve an unattainable amount of processing power to understand context.
It sounds believable: Joanna Stern's mother told her to buy the decongestant Sudafed in the morning, and by afternoon she sees…
Content Type: Examples
The CEO of MoviePass, an app that charges users $10 a month in return for allowing them to watch a movie every day in any of the 90% of US theatres included in its programme, said in March 2018 that the company was exploring the idea of monetising the location data it collects. MoviePass was always open about its plans to profit from the data it collects, but it seems likely that its 1.5 million users assumed that meant ticket sales, movie choice, promotions, and so on - not detailed tracking…
Content Type: Examples
The Danish company Blip Systems deploys sensors in cities, airports, and railway stations to help understand and analyse traffic flows and improve planning. In the UK's city of Portsmouth, a network of BlipTrack sensors was installed in 2013 by VAR Smart CCTV, and the data it has collected is used to identify problem areas and detect changing traffic patterns. The city hope that adding more sensors to identify individual journeys will help reduce commuting times, fuel consumption, and vehicular…
Content Type: Examples
In 2015, the University of Arizona began tracking freshman students’ ID card swipes as part of a project to try to lower the rate at which students drop out or leave for another university. The cards, which include an embedded sensor and are given to all students, can be read at almost 700 locations, including the entrance to residence halls and the student recreation centre, the library, and vending machines. The published policy for the CatCard student IDs does not disclose the practice.
In a…
Content Type: Examples
Designed for use by border guards, Unisys' LineSight software uses advanced data analytics and machine learning to help border guards decide whether to inspect travellers more closely before admitting them into their country. Unisys says the software assesses each traveller's risk beginning with the initial intent to travel and refines its assessment as more information becomes available at each stage of the journey - visa application, reservation, ticket purchase, seat selection, check-in, and…
Content Type: Examples
On August 1, 2017, Wisconsin company Three Square Market began offering its employees the option of implanting a tiny chip between their thumb and index finger. The chip enables employees to wave at hand at any of the company's RFID readers in order to enter the building, pay for food in the cafeteria, or use other company services. More than 50 out of the 80 staff at its headquarters volunteered; a few are said to be considering incorporating the chip into a piece of jewellery rather than have…
Content Type: Examples
Like other countries, the US began incorporating RFID chips into its passports in 2006. The chips, which store passport information including name, date of birth, passport number, photo, and biometric identifiers, enable machine-readable border controls like those now seen at an increasing number of airports. For authentication and to prevent counterfeiting and tampering, the chips also include a cryptographic signature (certificate) that authenticates the country issuing the passport. This…
Content Type: Examples
Car companies have long collected data about the consumers who buy their cars. Now, they hope to aggregate and sell customer preferences to outside vendors for marketing purposes much as online tech giants like Google and Facebook already do. The companies say that exploiting this data will help them improve the driving experience, enabling predictive maintenance and enhancing driving intelligence. A study published in July 2017 by the US Government Accountability Office found that none of the…
Content Type: Examples
In 2012, Durham Constabulary, in partnership with computer science academics at Cambridge University, began developing the Harm Assessment Risk Tool (HART), an artificial intelligence system designed to predict whether suspects are at low, moderate, or high risk of committing further crimes in the next two years. The tool is used to decide whether to recommend referral to the rehabilitation programme Checkpoint, which aims to reduce reoffending by helping remediate the individual's problems,…
Content Type: Examples
Reporter Kashmir Hill tested life in a smart home by adding numerous connected devices. The self-heating bed gave her daily reports on whether she'd reached her "sleep goal". She liked the convenience of the voice-activated lights, coffee maker, and music, the ability to convey a message to a toddler through a toy, and the robot vacuum cleaner. Meanwhile, colleague Surya Mattu built a Raspberry Pi router to monitor these devices to find out what data they collected and where they wanted to send…